RPC in the x-Kernel: evaluating new design techniques
SOSP '89 Proceedings of the twelfth ACM symposium on Operating systems principles
Horus: a flexible group communication system
Communications of the ACM
Building reliable, high-performance communication systems from components
Proceedings of the seventeenth ACM symposium on Operating systems principles
Trust in Cyberspace
Dynamic Virtual Private Networks
Dynamic Virtual Private Networks
The ensemble system
Integrating cooperative engagement capability into network-centric information system security
Current security management & Ethical issues of information technology
In their own words: CIO visions about the future of in-house IT organizations
ACM SIGMIS Database
A Collaborative Teaching Approach Using Integrated Electronic Environments for Information Security
ICCS '07 Proceedings of the 7th international conference on Computational Science, Part III: ICCS 2007
Fast and safe emergency communication through network virtualization
Proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly
Multipath routing issues in virtual private ad hoc networks
CCNC'09 Proceedings of the 6th IEEE Conference on Consumer Communications and Networking Conference
Hi-index | 4.10 |
Users who need to run mission-critical applications on the Internet will require functionality unlikely to be available in the Next-Generation Internet (NGI). Traditionally, critical networked applications have exploited physical or logical separation to justify a style of reasoning that considers each application independently. Migrating systems to a shared network infrastructure, however, frequently means isolation loss, compromising the safety argument. Thus a means of achieving and validating safety for NGI applications is necessary. This requires devising a way to isolate applications from one another in shared settings.The author proposes a new networking isolation capability, termed a virtual overlay network, or VON. Although a VON offers a response to the reliability and security needs of critical applications, it would be prohibitively costly to implement using contemporary technologies. This article explains VONs and how extending an existing router feature and coupling it with well-understood group communication techniques could support VONs at low cost, with good scalability.